You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -44,7 +44,7 @@ Implementing attack surface reduction rules move the first test ring into an ena
44
44
4. Switch problematic rules back to Audit.
45
45
46
46
> [!NOTE]
47
-
> For problematic rules (rules creating too much noise), it's better to create exclusions than to turn off rules or switching back to Audit. You'll have to determine what is best for your environment.
47
+
> For problematic rules (rules creating too much noise), it's better to create exclusions than to turn off rules or switching back to Audit. You have to determine what is best for your environment.
48
48
49
49
> [!TIP]
50
50
> When available, take advantage of the Warn mode setting in rules to limit disruptions. Enabling attack surface reduction rules in Warn mode enables you to capture triggered events and view their potential disruptions, without actually blocking end-user access. Learn more: [Warn mode for users](attack-surface-reduction.md#warn-mode-for-users).
@@ -57,15 +57,15 @@ Warn mode is effectively a Block instruction, but with the option for the user t
57
57
58
58
When you're confident that you've correctly configured the attack surface reduction rules for ring 1, you can widen the scope of your deployment to the next ring (ring n + 1).
59
59
60
-
In the follwing deployment process, steps 1 – 3 are essentially the same for each subsequent ring:
60
+
In the following deployment process, steps 1 – 3 are essentially the same for each subsequent ring:
61
61
62
62
1. Test rules in Audit mode.
63
63
64
64
2. Review attack surface reduction-triggered audit events in the Microsoft Defender portal.
65
65
66
66
3. Create exclusions.
67
67
68
-
4. Review: refine, add, or remove exclusions as necessary.
68
+
4. Review, and then refine, add, or remove exclusions as necessary.
69
69
70
70
5. Set rules to "block" mode.
71
71
@@ -77,7 +77,7 @@ In the follwing deployment process, steps 1 – 3 are essentially the same for e
77
77
78
78
#### Customize attack surface reduction rules
79
79
80
-
As you continue to expand your attack surface reduction rules deployment, you might find it necessary or beneficial to customize the attack surface reduction rules that you've enabled.
80
+
As you continue to expand your attack surface reduction rules deployment, you might find it necessary or beneficial to customize the attack surface reduction rules that are enabled.
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management.
656
+
654
657
### Block Win32 API calls from Office macros
655
658
656
659
This rule prevents VBA macros from calling Win32 APIs. Office VBA enables Win32 API calls. Malware can abuse this capability, such as [calling Win32 APIs to launch malicious shellcode](https://www.microsoft.com/security/blog/2018/09/12/office-vba-amsi-parting-the-veil-on-malicious-macros/) without writing anything directly to disk. Most organizations don't rely on the ability to call Win32 APIs in their day-to-day functioning, even if they use macros in other ways.
For more information, see: [Resources for Microsoft Defender for Endpoint on macOS](/defender-endpoint/mac-resources).
185
188
189
+
### Verifying behavior monitoring is enabled
190
+
191
+
To verify behavior monitoring is enabled, open Terminal, copy and run the following command:
192
+
193
+
```bash
194
+
mdatp health --details features
195
+
```
196
+
197
+
When behavior monitoring is enabled, the result displays the value of `behavior_monitoring` as enabled.
198
+
186
199
### To test behavior monitoring (prevention/block) detection
187
200
188
201
See [Behavior Monitoring demonstration](demonstration-behavior-monitoring.md).
@@ -192,9 +205,7 @@ See [Behavior Monitoring demonstration](demonstration-behavior-monitoring.md).
192
205
The existing Microsoft Defender for Endpoint on macOS command line interface can be used to review behavior monitoring details and artifacts.
193
206
194
207
```bash
195
-
196
208
sudo mdatp threat list
197
-
198
209
```
199
210
200
211
### Frequently asked questions (FAQ)
@@ -224,7 +235,7 @@ sudo mdatp exclusion process add --path <path to process with lots of events>
224
235
```
225
236
226
237
> [!IMPORTANT]
227
-
> Please verify the reliability of the processes being excluded. Excluding these processes will prevent all events from being sent to behavior monitoring and from undergoing content scanning. However, EDR will continue to receive events from these processes. It is important to note that this mitigation is unlikely to reduce CPU usage of the `wdavdaemon` or `wdavdaemon_enterprise` processes, but may affect `wdavdaemon_unprivileged`. If the other two processes are also experiencing high CPU usage, behavior monitoring may not be the sole cause, and contacting Microsoft support is recommended.
238
+
> Verify the reliability of the processes being excluded. Excluding these processes will prevent all events from being sent to behavior monitoring and from undergoing content scanning. However, EDR will continue to receive events from these processes. It is important to note that this mitigation is unlikely to reduce CPU usage of the `wdavdaemon` or `wdavdaemon_enterprise` processes, but may affect `wdavdaemon_unprivileged`. If the other two processes are also experiencing high CPU usage, behavior monitoring may not be the sole cause, and contacting Microsoft support is recommended.
228
239
229
240
Once done, disable behavior monitoring statistics:
230
241
@@ -269,29 +280,21 @@ NRI should have a low impact on network performance. Instead of holding the conn
269
280
2. Enable behavior monitoring if it's not already enabled:
sudo mdatp network-protection remote-settings-override set --value "{\"enableNriMpengineMetadata\" : true}"
290
-
291
-
292
296
```
293
297
294
298
> [!NOTE]
295
299
> While this feature is in preview, and because the setting is set by using command line, network real-time inspection (NRI) doesn't persist following reboots. You must re-enable it.
0 commit comments